Skip to main content
Erschienen in: Neural Computing and Applications 1/2015

01.01.2015 | Original Article

Artificial neural network for steganography

verfasst von: Sabah Husien, Haitham Badi

Erschienen in: Neural Computing and Applications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message. Also, there is randomness in hiding method such as combining several media (covers) with different methods to pass secret message. Information hiding represents a class of process used to embed data into various forms of media such as image, audio, or text. The proposed text in image cryptography and steganography system (TICSS) is an approach used to embed text into gray image (BMP). TICSS is easily applied by any end user.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Johnson NF, Duric ZJ (2001) Information hiding steganography and watermarking attack and countermeasure. Kluwer Academic Publishers, Norwell, MA Johnson NF, Duric ZJ (2001) Information hiding steganography and watermarking attack and countermeasure. Kluwer Academic Publishers, Norwell, MA
3.
Zurück zum Zitat Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev Hasan H, Abdul Kareem S (2012) Static hand gesture recognition using neural networks. Artif Intell Rev
4.
Zurück zum Zitat Hasan H, Abdul Kareem S (2013) Fingerprint image enhancement and recognition algorithms: a survey. Neural Comput Appl 23:606–1608CrossRef Hasan H, Abdul Kareem S (2013) Fingerprint image enhancement and recognition algorithms: a survey. Neural Comput Appl 23:606–1608CrossRef
6.
Zurück zum Zitat Hasan H, Abdul Kareem S (2013) Human–computer interaction using vision based hand gesture recognition systems:a survey. Neural Comput Appl. doi:10.1007/s00521013-1481-0 Hasan H, Abdul Kareem S (2013) Human–computer interaction using vision based hand gesture recognition systems:a survey. Neural Comput Appl. doi:10.​1007/​s00521013-1481-0
9.
Zurück zum Zitat Symonidis K (2000) Hand gesture recognition using neural networks. Master thesis, School of electronic and electrical engineering Symonidis K (2000) Hand gesture recognition using neural networks. Master thesis, School of electronic and electrical engineering
10.
Zurück zum Zitat Haykin S (1994) Neural networks a comprehensive foundation. Macmillan College Publishing Company, New YorkMATH Haykin S (1994) Neural networks a comprehensive foundation. Macmillan College Publishing Company, New YorkMATH
11.
Zurück zum Zitat Moghadassi A, Parvizian F, Hosseini S (2009) A new approach based on artificial neural networks for prediction of high pressure vapor-liquid equilibrium. Aust J Basic Appl Sci 3(3):1851–1862 Moghadassi A, Parvizian F, Hosseini S (2009) A new approach based on artificial neural networks for prediction of high pressure vapor-liquid equilibrium. Aust J Basic Appl Sci 3(3):1851–1862
12.
Zurück zum Zitat Din A (2002) Optimization and forecasting with financial time series. Paper presented at the note from seminar at CERN Din A (2002) Optimization and forecasting with financial time series. Paper presented at the note from seminar at CERN
13.
Zurück zum Zitat Dorothy E, Denning R (1983) Cryptography and data security. Addison Wesley Publishing Company Inc., Boston, MA Dorothy E, Denning R (1983) Cryptography and data security. Addison Wesley Publishing Company Inc., Boston, MA
14.
Zurück zum Zitat Lane V (1988) Security of computer based information system. Macmillan Education LTD, New York, NY Lane V (1988) Security of computer based information system. Macmillan Education LTD, New York, NY
15.
Zurück zum Zitat Johnson (2001) Information hiding steganography and watermarking attack and countermeasures. Kluwer Academic Publishers Johnson (2001) Information hiding steganography and watermarking attack and countermeasures. Kluwer Academic Publishers
16.
Zurück zum Zitat Benjamin B, Santiago G, Victor B (2001) Steganographic watermarking for documents. In: Proceeding on the 34th Hawaii international conference on system science Benjamin B, Santiago G, Victor B (2001) Steganographic watermarking for documents. In: Proceeding on the 34th Hawaii international conference on system science
17.
Zurück zum Zitat Craver S (1998) On public-key steganography in the presence of an active warden information hiding, second international workshop proceeding, vol 1525, pp 355–368 Craver S (1998) On public-key steganography in the presence of an active warden information hiding, second international workshop proceeding, vol 1525, pp 355–368
18.
Zurück zum Zitat Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and grayscale image, magazine of IEEE multimedia special issue on security, October–November issue, pp 22–28 Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and grayscale image, magazine of IEEE multimedia special issue on security, October–November issue, pp 22–28
19.
Zurück zum Zitat Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM, special session on multimedia security and watermarking. Ottawa, Canada, pp 27–30 Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM, special session on multimedia security and watermarking. Ottawa, Canada, pp 27–30
20.
Zurück zum Zitat Uruba I (2001) Hiding text in image. M.Sc. Thesis, University of technology, Computer Science Department Uruba I (2001) Hiding text in image. M.Sc. Thesis, University of technology, Computer Science Department
21.
Zurück zum Zitat Mohammed S (2001) Text file hiding techniques with implementation. M.Sc. Thesis, National Computer Center Mohammed S (2001) Text file hiding techniques with implementation. M.Sc. Thesis, National Computer Center
22.
Zurück zum Zitat Al-hamami M (2002) Information hiding attack in Image. M.Sc.thesis, Iraqi commission for computer and informatics, Informatics Institute for Postgraduate Studies Al-hamami M (2002) Information hiding attack in Image. M.Sc.thesis, Iraqi commission for computer and informatics, Informatics Institute for Postgraduate Studies
23.
Zurück zum Zitat Petitcolas, Fabien A, Ross J (1998) Attack on copyright marking systems information hiding, second international workshop proceeding, vol 1525, pp 218–238 Petitcolas, Fabien A, Ross J (1998) Attack on copyright marking systems information hiding, second international workshop proceeding, vol 1525, pp 218–238
24.
Zurück zum Zitat Thomas B (2008) Quantitative security of block ciphers designs and cryptanalysis tools. PhD Ecole Polytechnique Federale De Lausame, Suisse Thomas B (2008) Quantitative security of block ciphers designs and cryptanalysis tools. PhD Ecole Polytechnique Federale De Lausame, Suisse
25.
Zurück zum Zitat Zehnran J, Yanhong Z (2006) Using gene neural network to D target identification. J Integr Bioinform 1(2):26–28 Zehnran J, Yanhong Z (2006) Using gene neural network to D target identification. J Integr Bioinform 1(2):26–28
26.
Zurück zum Zitat Sarle S (1999) Artificial neural networks and their biological motivation internet explorer. Artif Intell Worlf Wide Navig. http://www.csa.ru Sarle S (1999) Artificial neural networks and their biological motivation internet explorer. Artif Intell Worlf Wide Navig. http://​www.​csa.​ru
27.
Zurück zum Zitat Whitefield D, Martin H (1979) Privacy and authentication an introduction to cryptography. Comput J IEEE 67(3):397–427 Whitefield D, Martin H (1979) Privacy and authentication an introduction to cryptography. Comput J IEEE 67(3):397–427
28.
Zurück zum Zitat Khaled A, Waiel F, Mohamed A, Alaa A (2010) Attack and construction of simulator for some of cipher system using neuro-identifier. Int Arab J Inf Technol 7(4):365–372 Khaled A, Waiel F, Mohamed A, Alaa A (2010) Attack and construction of simulator for some of cipher system using neuro-identifier. Int Arab J Inf Technol 7(4):365–372
29.
Zurück zum Zitat Tanomaru J (2002) Comparative study of two neuro network approaches for nonlinear identification. In: Proceeding of international symposium on speech image processing and neural networks. Hong Kong, pp 487–490 Tanomaru J (2002) Comparative study of two neuro network approaches for nonlinear identification. In: Proceeding of international symposium on speech image processing and neural networks. Hong Kong, pp 487–490
30.
Zurück zum Zitat Josef P, Jennifer S (1988) Cryptography an introduction to computer security. Prentice Hall, Upper Saddle River Josef P, Jennifer S (1988) Cryptography an introduction to computer security. Prentice Hall, Upper Saddle River
31.
Zurück zum Zitat Zabikowski R, Dzielinski A (1995) Neural approximation a control perspective. In: Proceeding of neural network engineering and dynamic control systems, advances in industrial control. Berlin, pp 1–25 Zabikowski R, Dzielinski A (1995) Neural approximation a control perspective. In: Proceeding of neural network engineering and dynamic control systems, advances in industrial control. Berlin, pp 1–25
32.
Zurück zum Zitat Ruppel RA (1992) Security models and notions for stream cipher, cryptography and coding II. Mitchell press, Burnaby, BC Ruppel RA (1992) Security models and notions for stream cipher, cryptography and coding II. Mitchell press, Burnaby, BC
33.
Zurück zum Zitat Ruppel RA (1992) Stream ciphers contemporary cryptology, the science of information integrity, Simmons, j. IEEE Press Ruppel RA (1992) Stream ciphers contemporary cryptology, the science of information integrity, Simmons, j. IEEE Press
Metadaten
Titel
Artificial neural network for steganography
verfasst von
Sabah Husien
Haitham Badi
Publikationsdatum
01.01.2015
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 1/2015
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-014-1702-1

Weitere Artikel der Ausgabe 1/2015

Neural Computing and Applications 1/2015 Zur Ausgabe